US20050028010A1 - System and method for addressing denial of service virus attacks - Google Patents
System and method for addressing denial of service virus attacks Download PDFInfo
- Publication number
- US20050028010A1 US20050028010A1 US10/629,170 US62917003A US2005028010A1 US 20050028010 A1 US20050028010 A1 US 20050028010A1 US 62917003 A US62917003 A US 62917003A US 2005028010 A1 US2005028010 A1 US 2005028010A1
- Authority
- US
- United States
- Prior art keywords
- improper
- message
- http
- response
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Definitions
- the present invention relates generally to anti-virus systems, and more specifically relates to a system and method of addressing denial of service virus attacks aimed at web servers.
- DoS denial of service
- a DoS attack in which a large number of requests are addressed to a particular shared web resource, e.g., by a “hacker” or “cracker.” Because any web resource has a fixed ability to respond to requests, a large volume of bogus requests will cause delays in servicing genuine requests. In a worst-case scenario, the resource may actually crash, completely denying service to legitimate requests.
- the web resource is a web server utilized by a business entity
- a DoS attack can shut down services critical to the business entity.
- the aforementioned publications are hereby incorporated by reference.
- the present invention addresses the above-mentioned problems, as well as others, by providing a system and method for addressing denial of service attacks without adding significant computational requirements and costs.
- the invention provides a system for addressing denial of service attacks directed at a web resource, comprising: a system for detecting improper requests; and a system for responding to improper requests that issues an HTTP “OK” response code when improper request is detected.
- the invention provides a method for addressing denial of service attacks directed at a web resource, comprising: receiving messages at the web resource; analyzing each message and determining if the message is improper; storing the source address of a message if the message is improper; responding to a first improper message from an identified source address with an HTTP error response; responding to a set of subsequent improper messages from the identified source address with HTTP “OK” response codes; and stopping responses to the identified source address for all received improper messages after the set of subsequent improper messages have been responded to.
- the invention provides a program product stored on a recordable medium for addressing denial of service attacks directed at a web resource, comprising: means for receiving messages at the web resource; means for analyzing each message and determining if the message is improper; means for storing the source address of a message if the message is improper; means for responding to a first improper message from an identified source address with an HTTP error response; means for responding to subsequent improper messages from the identified source address with HTTP “OK” responses.
- FIG. 1 depicts a web server having a denial of service defense system in accordance with the present invention.
- FIG. 2 depicts a flow diagram of a method of implementing a denial of service defense system in accordance with the present invention.
- FIG. 1 depicts a web server 10 having a denial of service (DoS) defense system 12 for addressing DoS attacks.
- DoS defense system 12 provides a relatively passive mechanism for handling messages associated with DoS attacks so that the resources consumed by the web server 10 will be less than those consumed by the attacker. Accordingly, the defensive behavior implemented by DoS defense system 12 will cause the attacker to stop the attack because of the attacker's resource consumption level.
- DoS defense system 12 may be implemented as a standalone system, as a software program product, or be integrated into web server 10 .
- DoS defense system 12 can be configured to act as a “front-end” to most of the server processes 14 that handle requests 20 sent to the web server 10 .
- front-end to most of the server processes 14 that handle requests 20 sent to the web server 10 .
- server processes 14 of web server 10 will not affected or utilized.
- HTTP hypertext transfer protocol
- DoS defense system 12 includes an improper request detection system 14 , a tracking database 18 , and a DoS response system 16 that includes a DoS response protocol 17 .
- Improper request detection system 14 can include any logic that examines incoming requests 20 and determines if the request 20 appears to be improper. In the case of a typical application server known in the art, identifying improper requests is a relatively simple operation since the source and format of requests 20 are generally limited and known.
- a request may be deemed improper if: (1) it is received from an unexpected host, such as www; (2) if the received packet has a zero length; (3) if the received packet is neither an HTTP “post” or “get” command when only these commands are expected; or (4) if the request comprises “post” or “get” arguments unknown to the web server 10 .
- the request is deemed proper or good, it is passed to the standard set of server processes 14 for processing.
- the request appears to be improper of bad, the request is passed to DoS response system 16 .
- source information from all improper requests are stored in memory and/or a tracking database 18 so that improper requests from the same source can be identified and dealt with as an apparent DoS attack.
- DoS response system 16 generates a sequence of responses 22 to the improper requests 20 based on DoS response protocol 17 .
- DoS response protocol 17 will cause HTTP 204 “OK” responses 22 (or other similar status codes) to be issued when an improper request is received.
- HTTP includes a set of response codes that are used by a web server to provide a status back to the requesting resource. The codes may indicate success, redirection or error conditions. For instance, in HTTP/1.0, 200 means “OK; the request was fulfilled,” 204 means “OK, no response—request received but no info exists to send back,” etc.
- any attacker sending a message to purposefully slow the processing in web server 10 is hit with acceptances that look like their job is done.
- the attacker is then faced with either continuing to send the same message and receiving the same trivial response, or moving on.
- the attacker will retry some number of times, and then move on. Meanwhile, because the response is so trivial, the server continues to handle legitimate incoming messages without interruption.
- the DoS response system 16 can be implemented to simply stop responding to the current stream of requests from the same source address. The attacker is forced to conclude that the attack was successful. However, even if the attacker continues to send improper requests, the attack will not disable the server since the effort to send out “no response” is so low that the server continues to handle legitimate messages without interruption.
- FIG. 1 depicts a response sequence 22 in which the first time an improper message is received from an IP address, a standard error message may be issued, e.g., an HTTP 404 “Not Found” message or an HTTP 400 “Bad Request” message. Then, for a subsequent set of improper messages from the same (or related) IP address, HTTP 204 “OK” messages may be issued. Obviously, the size of the subsequent “set” can be any number deemed appropriate to most effectively ward off the attack, such as 4-10 improper messages. Finally, if additional improper messages from the source are still received after the subsequent set, then “no response” will be issued.
- a standard error message may be issued, e.g., an HTTP 404 “Not Found” message or an HTTP 400 “Bad Request” message.
- HTTP 204 “OK” messages may be issued.
- the size of the subsequent “set” can be any number deemed appropriate to most effectively ward off the attack, such as 4-10 improper messages.
- DoS Repsonse System 16 may simply issue HTTP “OK” responses to all improper requests. Regardless of the-specific protocol, responding in this manner consumes very little computational resources. Thus, an important result is that improper messages are quickly identified and responded to in a standard, repeated manner with the goal of using less effort than the offending resource used to start and/or maintain the attack.
- the web server receives a message.
- IP Internet protocol
- a standard error message or error handling procedure may be implemented at step S 6 .
- a check is made at step S 7 to determine if more than N occurrences of the improper message (where N equals a predetermined number) have been received. If more than N occurrences have not been received, then an HTTP OK response is issued at step S 8 . If more than N occurrences have been received, then no response is issued at step S 9 .
- systems, functions, mechanisms, methods, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system or other apparatus adapted for carrying out the methods described herein.
- a typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein.
- a specific use computer containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized.
- the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions.
- Computer program, software program, program, program product, or software in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
A system and method for addressing denial of service attacks directed at a web resource. The method comprises the steps of: receiving messages at the web resource; analyzing each message and determining if the message is improper; storing the source address of a message if the message is improper; responding to a first improper message from an identified source address with an HTTP error response; responding to a few subsequent improper messages from the identified source address with HTTP “OK” response codes; and finally stopping all responses to the identified source address.
Description
- 1. Technical Field
- The present invention relates generally to anti-virus systems, and more specifically relates to a system and method of addressing denial of service virus attacks aimed at web servers.
- 2. Related Art
- Viruses or attacks are prevalent today throughout the Internet. One such type is referred to as a “denial of service” (DoS) attack in which a large number of requests are addressed to a particular shared web resource, e.g., by a “hacker” or “cracker.” Because any web resource has a fixed ability to respond to requests, a large volume of bogus requests will cause delays in servicing genuine requests. In a worst-case scenario, the resource may actually crash, completely denying service to legitimate requests. In a case where the web resource is a web server utilized by a business entity, a DoS attack can shut down services critical to the business entity.
- Numerous systems have been proposed to address denial of service attacks. However, most such solutions often consume a significant amount of computational server resources to identify and process bogus requests, and/or require additional systems or resources to address the problem. For instance, U.S. Patent Application Publication US 2002/0002686 A1 by Vange et al., “Method and System for Overcoming Denial Of Service Attacks,” published on Jan. 3, 2002, requires a request processing component that receives requests on behalf of the web resource. Similarly, in U.S. Patent Application Publication US 2003/0023733 A1 by Lingafelt et al., “Apparatus and Method for Using a Network Processor to Guard Against a “Denial of Service” Attack on a Server or Server Cluster,” published on Jan. 30, 2003, requires a network processor interposed between the server and the network. The aforementioned publications are hereby incorporated by reference.
- Thus, current solutions add significant additional computational requirements and costs to identifying and processing DoS attacks. Accordingly, a need exists for a system that can address DoS attacks at web resources, such as web servers, without adding significant costs and/or computational requirements.
- The present invention addresses the above-mentioned problems, as well as others, by providing a system and method for addressing denial of service attacks without adding significant computational requirements and costs. In a first aspect, the invention provides a system for addressing denial of service attacks directed at a web resource, comprising: a system for detecting improper requests; and a system for responding to improper requests that issues an HTTP “OK” response code when improper request is detected.
- In a second aspect, the invention provides a method for addressing denial of service attacks directed at a web resource, comprising: receiving messages at the web resource; analyzing each message and determining if the message is improper; storing the source address of a message if the message is improper; responding to a first improper message from an identified source address with an HTTP error response; responding to a set of subsequent improper messages from the identified source address with HTTP “OK” response codes; and stopping responses to the identified source address for all received improper messages after the set of subsequent improper messages have been responded to.
- In a third aspect, the invention provides a program product stored on a recordable medium for addressing denial of service attacks directed at a web resource, comprising: means for receiving messages at the web resource; means for analyzing each message and determining if the message is improper; means for storing the source address of a message if the message is improper; means for responding to a first improper message from an identified source address with an HTTP error response; means for responding to subsequent improper messages from the identified source address with HTTP “OK” responses.
- These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
-
FIG. 1 depicts a web server having a denial of service defense system in accordance with the present invention. -
FIG. 2 depicts a flow diagram of a method of implementing a denial of service defense system in accordance with the present invention. - Referring now to the drawings,
FIG. 1 depicts aweb server 10 having a denial of service (DoS)defense system 12 for addressing DoS attacks. As explained in further detail below, DoSdefense system 12 provides a relatively passive mechanism for handling messages associated with DoS attacks so that the resources consumed by theweb server 10 will be less than those consumed by the attacker. Accordingly, the defensive behavior implemented by DoSdefense system 12 will cause the attacker to stop the attack because of the attacker's resource consumption level. - DoS
defense system 12 may be implemented as a standalone system, as a software program product, or be integrated intoweb server 10. In such implementations, DoSdefense system 12 can be configured to act as a “front-end” to most of theserver processes 14 that handlerequests 20 sent to theweb server 10. Thus, if an attack occurs,most server processes 14 ofweb server 10 will not affected or utilized. It should be understood that while the present invention is described with reference to aweb server 10 that receives and responds to requests, the invention could be implemented with any web resource that receives and responds to any type of message using a hypertext transfer protocol (HTTP), or similar communications protocol. - DoS
defense system 12 includes an improperrequest detection system 14, atracking database 18, and aDoS response system 16 that includes aDoS response protocol 17. Improperrequest detection system 14 can include any logic that examinesincoming requests 20 and determines if therequest 20 appears to be improper. In the case of a typical application server known in the art, identifying improper requests is a relatively simple operation since the source and format ofrequests 20 are generally limited and known. For instance, a request may be deemed improper if: (1) it is received from an unexpected host, such as www; (2) if the received packet has a zero length; (3) if the received packet is neither an HTTP “post” or “get” command when only these commands are expected; or (4) if the request comprises “post” or “get” arguments unknown to theweb server 10. In the event the request is deemed proper or good, it is passed to the standard set ofserver processes 14 for processing. Alternatively, if the request appears to be improper of bad, the request is passed toDoS response system 16. Furthermore, source information from all improper requests are stored in memory and/or atracking database 18 so that improper requests from the same source can be identified and dealt with as an apparent DoS attack. -
DoS response system 16 generates a sequence ofresponses 22 to theimproper requests 20 based onDoS response protocol 17. In general, DoSresponse protocol 17 will cause HTTP 204 “OK” responses 22 (or other similar status codes) to be issued when an improper request is received. As is readily known in the art, HTTP includes a set of response codes that are used by a web server to provide a status back to the requesting resource. The codes may indicate success, redirection or error conditions. For instance, in HTTP/1.0, 200 means “OK; the request was fulfilled,” 204 means “OK, no response—request received but no info exists to send back,” etc. By responding to improper messages with an HTTP “OK”code 22, any attacker sending a message to purposefully slow the processing inweb server 10 is hit with acceptances that look like their job is done. The attacker is then faced with either continuing to send the same message and receiving the same trivial response, or moving on. Typically, the attacker will retry some number of times, and then move on. Meanwhile, because the response is so trivial, the server continues to handle legitimate incoming messages without interruption. - If the attacker continues through a few “OK” responses, then the
DoS response system 16 can be implemented to simply stop responding to the current stream of requests from the same source address. The attacker is forced to conclude that the attack was successful. However, even if the attacker continues to send improper requests, the attack will not disable the server since the effort to send out “no response” is so low that the server continues to handle legitimate messages without interruption. - In order to differentiate legitimate request errors from a DoS attack, various
DoS response protocols 17 may be implemented. For instance,FIG. 1 depicts aresponse sequence 22 in which the first time an improper message is received from an IP address, a standard error message may be issued, e.g., an HTTP 404 “Not Found” message or an HTTP 400 “Bad Request” message. Then, for a subsequent set of improper messages from the same (or related) IP address, HTTP 204 “OK” messages may be issued. Obviously, the size of the subsequent “set” can be any number deemed appropriate to most effectively ward off the attack, such as 4-10 improper messages. Finally, if additional improper messages from the source are still received after the subsequent set, then “no response” will be issued. Different escalation schemes may be implemented depending on the nature and type of the improper request. For instance, DoS Repsonse System 16 may simply issue HTTP “OK” responses to all improper requests. Regardless of the-specific protocol, responding in this manner consumes very little computational resources. Thus, an important result is that improper messages are quickly identified and responded to in a standard, repeated manner with the goal of using less effort than the offending resource used to start and/or maintain the attack. - Referring now to
FIG. 2 , a flow diagram is shown depicting an exemplary methodology for implementing theDoS defense system 12. In the first step S1, the web server receives a message. At step S2, a determination is made whether the message is improper. If it is not improper, the message is processed at step S3 in a standard manner. If the message is deemed improper, information from the message, e.g., the source or Internet protocol (IP) address of the message is stored and tracked at step S4. Next, a determination is made whether the improper message is a first occurrence from the same source (e.g., based on the IP address or related IP addresses) at step S5. If the improper message is a first occurrence from the identified source of the message, then a standard error message or error handling procedure may be implemented at step S6. Alternatively, if the improper message is not a first occurrence from the identified source, then a check is made at step S7 to determine if more than N occurrences of the improper message (where N equals a predetermined number) have been received. If more than N occurrences have not been received, then an HTTP OK response is issued at step S8. If more than N occurrences have been received, then no response is issued at step S9. - It is understood that the systems, functions, mechanisms, methods, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system or other apparatus adapted for carrying out the methods described herein. A typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein. Alternatively, a specific use computer, containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions. Computer program, software program, program, program product, or software, in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
- The foregoing description of the preferred embodiments of the invention has been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teachings. Such modifications and variations that are apparent to a person skilled in the art are intended to be included within the scope of this invention as defined by the accompanying claims.
Claims (22)
1. A system for addressing denial of service attacks directed at a web resource, comprising:
a system for detecting improper requests; and
a system for responding to improper requests that issues an HTTP “OK” response code when improper request is detected.
2. The system of claim 1 , wherein the system for responding stops issuing HTTP “OK” response codes and issues no response after a predetermined number of improper requests are detected.
3. The system of claim 1 , wherein a request is deemed improper if the request is received from an unexpected host.
4. The system of claim 1 , wherein a request is deemed improper if the request has a zero length.
5. The system of claim 1 , wherein a request is deemed improper if an HTTP “post” or an HTTP “get” command is expected and neither an HTTP “post” nor an HTTP “get” command is received.
6. The system of claim 1 , wherein a request is deemed improper if the request includes a HTTP “post” or “get” command with unknown arguments.
7. The system of claim 1 , wherein the HTTP “OK” response code comprises an HTTP 204 “OK” message code.
8. The system of claim 1 , wherein the system for responding to improper requests includes a response protocol that utilizes a standard error handling procedure for a first improper request from a requesting resource, issues an HTTP OK response code for N subsequent improper requests from the requesting resource, and then stops responding to the requesting resource altogether.
9. The system of claim 1 , wherein the web resource comprises a server.
10. A method for addressing denial of service attacks directed at a web resource, comprising:
receiving messages at the web resource;
analyzing each message and determining if the message is improper;
storing the source address of a message if the message is improper;
responding to a first improper message from an identified source address with an HTTP error response;
responding to a set of subsequent improper messages from the identified source address with HTTP “OK” response codes; and
stopping responses to the identified source address for all received improper messages after the set of subsequent improper messages have been responded to.
11. The method of claim 10 , wherein a message is deemed improper if the message is received from an unexpected host.
12. The method of claim 10 , wherein a message is deemed improper if the message has a zero length.
13. The method of claim 10 , wherein a message is deemed improper if the message is neither an HTTP “post” nor an HTTP “get” command when one of these commands is expected.
14. The method of claim 10 , wherein a message is deemed improper if the message includes a HTTP “post” or “get” command with unknown arguments.
15. The method of claim 10 , wherein the HTTP “OK” response code comprises an HTTP 204 “OK” message code.
16. The method of claim 10 , wherein the HTTP “OK” response comprises an HTTP 200 “OK” message code.
17. A program product stored on a recordable medium for addressing denial of service attacks directed at a web resource, comprising:
means for receiving messages at the web resource;
means for analyzing each message and determining if the message is improper;
means for storing the source address of a message if the message is improper;
means for responding to a first improper message from an identified source address with an HTTP error response; and
means for responding to subsequent improper messages from the identified source address with HTTP “OK” response codes.
18. The program product of claim 17 , further comprising means for stopping responses to the identified source address after a predetermined number of subsequent improper messages have been received.
19. The program product of claim 17 , wherein a message is deemed improper if the message is received from an unexpected host; if the message has a zero length; if the message is neither an expected HTTP “post” nor an expected HTTP “get” command; or if the message includes a HTTP “post” or “get” command with unknown arguments.
20. The program product of claim 17 , wherein the HTTP “OK” response codes comprise HTTP 204 “OK” response codes.
21. The program product of claim 17 , wherein messages that are deemed proper are passed to the web resource for further processing.
22. The program product of claim 17 , wherein the web resource is a web server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/629,170 US20050028010A1 (en) | 2003-07-29 | 2003-07-29 | System and method for addressing denial of service virus attacks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/629,170 US20050028010A1 (en) | 2003-07-29 | 2003-07-29 | System and method for addressing denial of service virus attacks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050028010A1 true US20050028010A1 (en) | 2005-02-03 |
Family
ID=34103555
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/629,170 Abandoned US20050028010A1 (en) | 2003-07-29 | 2003-07-29 | System and method for addressing denial of service virus attacks |
Country Status (1)
Country | Link |
---|---|
US (1) | US20050028010A1 (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100281311A1 (en) * | 2009-04-30 | 2010-11-04 | International Business Machines Corporation | Method and system for reconstructing error response messages under web application environment |
US8549645B2 (en) * | 2011-10-21 | 2013-10-01 | Mcafee, Inc. | System and method for detection of denial of service attacks |
CN103916389A (en) * | 2014-03-19 | 2014-07-09 | 汉柏科技有限公司 | Method for preventing HttpFlood attack and firewall |
US20140373138A1 (en) * | 2011-06-27 | 2014-12-18 | Ahnlab, Inc. | Method and apparatus for preventing distributed denial of service attack |
CN104378359A (en) * | 2014-10-23 | 2015-02-25 | 河北省电力建设调整试验所 | Link depletion type CC attack prevention method |
US9282116B1 (en) * | 2012-09-27 | 2016-03-08 | F5 Networks, Inc. | System and method for preventing DOS attacks utilizing invalid transaction statistics |
US9609017B1 (en) | 2012-02-20 | 2017-03-28 | F5 Networks, Inc. | Methods for preventing a distributed denial service attack and devices thereof |
US9843554B2 (en) | 2012-02-15 | 2017-12-12 | F5 Networks, Inc. | Methods for dynamic DNS implementation and systems thereof |
USRE47019E1 (en) | 2010-07-14 | 2018-08-28 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US11134062B1 (en) * | 2020-06-12 | 2021-09-28 | Bank Of America Corporation | Isolating and disabling unauthorized applications |
US11425100B2 (en) * | 2020-07-16 | 2022-08-23 | Bank Of America Corporation | Optimization of redundant usage patterns based on historical data and security constraints |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5941944A (en) * | 1997-03-03 | 1999-08-24 | Microsoft Corporation | Method for providing a substitute for a requested inaccessible object by identifying substantially similar objects using weights corresponding to object features |
US6202087B1 (en) * | 1999-03-22 | 2001-03-13 | Ofer Gadish | Replacement of error messages with non-error messages |
US20010042200A1 (en) * | 2000-05-12 | 2001-11-15 | International Business Machines | Methods and systems for defeating TCP SYN flooding attacks |
US20020002686A1 (en) * | 2000-04-17 | 2002-01-03 | Mark Vange | Method and system for overcoming denial of service attacks |
US20020016925A1 (en) * | 2000-04-13 | 2002-02-07 | Pennec Jean-Francois Le | Method and system for controlling and filtering files using a virus-free certificate |
US20020059396A1 (en) * | 2000-09-28 | 2002-05-16 | Holzer Dipl.-Ing. Rene | Apparatus and a process for the retrieval of data in the case of a faulty request on a server in the internet |
US20020103783A1 (en) * | 2000-12-01 | 2002-08-01 | Network Appliance, Inc. | Decentralized virus scanning for stored data |
US20020103916A1 (en) * | 2000-09-07 | 2002-08-01 | Benjie Chen | Thwarting connection-based denial of service attacks |
US20020147915A1 (en) * | 2001-04-10 | 2002-10-10 | International Business Machines Corporation | Method and apparatus for the detection, notification, and elimination of certain computer viruses on a network using a promiscuous system as bait |
US20020199109A1 (en) * | 2001-06-25 | 2002-12-26 | Boom Douglas D. | System, method and computer program for the detection and restriction of the network activity of denial of service attack software |
US20030023733A1 (en) * | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster |
US20030037258A1 (en) * | 2001-08-17 | 2003-02-20 | Izchak Koren | Information security system and method` |
US20030046577A1 (en) * | 2001-08-31 | 2003-03-06 | International Business Machines Corporation | System and method for the detection of and reaction to computer hacker denial of service attacks |
US20030061306A1 (en) * | 2001-09-27 | 2003-03-27 | Kabushiki Kaisha Toshiba | Server computer protection apparatus, method, program product, and server computer apparatus |
US6594697B1 (en) * | 1999-05-20 | 2003-07-15 | Microsoft Corporation | Client system having error page analysis and replacement capabilities |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US6782430B1 (en) * | 1998-06-05 | 2004-08-24 | International Business Machines Corporation | Invalid link recovery |
US6996845B1 (en) * | 2000-11-28 | 2006-02-07 | S.P.I. Dynamics Incorporated | Internet security analysis system and process |
US7325045B1 (en) * | 2003-08-05 | 2008-01-29 | A9.Com, Inc. | Error processing methods for providing responsive content to a user when a page load error occurs |
-
2003
- 2003-07-29 US US10/629,170 patent/US20050028010A1/en not_active Abandoned
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5941944A (en) * | 1997-03-03 | 1999-08-24 | Microsoft Corporation | Method for providing a substitute for a requested inaccessible object by identifying substantially similar objects using weights corresponding to object features |
US6668325B1 (en) * | 1997-06-09 | 2003-12-23 | Intertrust Technologies | Obfuscation techniques for enhancing software security |
US6782430B1 (en) * | 1998-06-05 | 2004-08-24 | International Business Machines Corporation | Invalid link recovery |
US6202087B1 (en) * | 1999-03-22 | 2001-03-13 | Ofer Gadish | Replacement of error messages with non-error messages |
US6594697B1 (en) * | 1999-05-20 | 2003-07-15 | Microsoft Corporation | Client system having error page analysis and replacement capabilities |
US20020016925A1 (en) * | 2000-04-13 | 2002-02-07 | Pennec Jean-Francois Le | Method and system for controlling and filtering files using a virus-free certificate |
US20020002686A1 (en) * | 2000-04-17 | 2002-01-03 | Mark Vange | Method and system for overcoming denial of service attacks |
US20010042200A1 (en) * | 2000-05-12 | 2001-11-15 | International Business Machines | Methods and systems for defeating TCP SYN flooding attacks |
US20020103916A1 (en) * | 2000-09-07 | 2002-08-01 | Benjie Chen | Thwarting connection-based denial of service attacks |
US20020059396A1 (en) * | 2000-09-28 | 2002-05-16 | Holzer Dipl.-Ing. Rene | Apparatus and a process for the retrieval of data in the case of a faulty request on a server in the internet |
US6996845B1 (en) * | 2000-11-28 | 2006-02-07 | S.P.I. Dynamics Incorporated | Internet security analysis system and process |
US20020103783A1 (en) * | 2000-12-01 | 2002-08-01 | Network Appliance, Inc. | Decentralized virus scanning for stored data |
US20020147915A1 (en) * | 2001-04-10 | 2002-10-10 | International Business Machines Corporation | Method and apparatus for the detection, notification, and elimination of certain computer viruses on a network using a promiscuous system as bait |
US20020199109A1 (en) * | 2001-06-25 | 2002-12-26 | Boom Douglas D. | System, method and computer program for the detection and restriction of the network activity of denial of service attack software |
US20030023733A1 (en) * | 2001-07-26 | 2003-01-30 | International Business Machines Corporation | Apparatus and method for using a network processor to guard against a "denial-of-service" attack on a server or server cluster |
US20030037258A1 (en) * | 2001-08-17 | 2003-02-20 | Izchak Koren | Information security system and method` |
US20030046577A1 (en) * | 2001-08-31 | 2003-03-06 | International Business Machines Corporation | System and method for the detection of and reaction to computer hacker denial of service attacks |
US20030061306A1 (en) * | 2001-09-27 | 2003-03-27 | Kabushiki Kaisha Toshiba | Server computer protection apparatus, method, program product, and server computer apparatus |
US7325045B1 (en) * | 2003-08-05 | 2008-01-29 | A9.Com, Inc. | Error processing methods for providing responsive content to a user when a page load error occurs |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100281311A1 (en) * | 2009-04-30 | 2010-11-04 | International Business Machines Corporation | Method and system for reconstructing error response messages under web application environment |
US8543869B2 (en) * | 2009-04-30 | 2013-09-24 | International Business Machines Corporation | Method and system for reconstructing error response messages under web application environment |
USRE47019E1 (en) | 2010-07-14 | 2018-08-28 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US20140373138A1 (en) * | 2011-06-27 | 2014-12-18 | Ahnlab, Inc. | Method and apparatus for preventing distributed denial of service attack |
US8549645B2 (en) * | 2011-10-21 | 2013-10-01 | Mcafee, Inc. | System and method for detection of denial of service attacks |
US9843554B2 (en) | 2012-02-15 | 2017-12-12 | F5 Networks, Inc. | Methods for dynamic DNS implementation and systems thereof |
US9609017B1 (en) | 2012-02-20 | 2017-03-28 | F5 Networks, Inc. | Methods for preventing a distributed denial service attack and devices thereof |
US9282116B1 (en) * | 2012-09-27 | 2016-03-08 | F5 Networks, Inc. | System and method for preventing DOS attacks utilizing invalid transaction statistics |
CN103916389A (en) * | 2014-03-19 | 2014-07-09 | 汉柏科技有限公司 | Method for preventing HttpFlood attack and firewall |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
CN104378359A (en) * | 2014-10-23 | 2015-02-25 | 河北省电力建设调整试验所 | Link depletion type CC attack prevention method |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US11134062B1 (en) * | 2020-06-12 | 2021-09-28 | Bank Of America Corporation | Isolating and disabling unauthorized applications |
US11425100B2 (en) * | 2020-07-16 | 2022-08-23 | Bank Of America Corporation | Optimization of redundant usage patterns based on historical data and security constraints |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050028010A1 (en) | System and method for addressing denial of service virus attacks | |
US9088605B2 (en) | Proactive network attack demand management | |
EP1805963B1 (en) | Offline analysis of packets | |
KR101122646B1 (en) | Method and device against intelligent bots by masquerading virtual machine information | |
US7779470B2 (en) | Server denial of service shield | |
US8869268B1 (en) | Method and apparatus for disrupting the command and control infrastructure of hostile programs | |
US8819835B2 (en) | Silent-mode signature testing in anti-malware processing | |
US20020184362A1 (en) | System and method for extending server security through monitored load management | |
US8646038B2 (en) | Automated service for blocking malware hosts | |
US20090055930A1 (en) | Content Security by Network Switch | |
US7565437B2 (en) | Systems and methods for controlling the number of clients that access a server | |
US20020199109A1 (en) | System, method and computer program for the detection and restriction of the network activity of denial of service attack software | |
JP2008066903A (en) | Intrusion detection system, its method, and communication device using it | |
JP2019021294A (en) | SYSTEM AND METHOD OF DETERMINING DDoS ATTACKS | |
US20080184105A1 (en) | Method and Apparatus for Processing a Parseable Document | |
US20070289014A1 (en) | Network security device and method for processing packet data using the same | |
EP3188442A1 (en) | Detection, prevention, and/or mitigation of dos attacks in publish/subscribe infrastructure | |
CN111327615A (en) | CC attack protection method and system | |
US8214898B2 (en) | ICAP processing of partial content to identify security issues | |
US7760722B1 (en) | Router based defense against denial of service attacks using dynamic feedback from attacked host | |
US20080201776A1 (en) | Method And Computing System For Avoiding Denial Of Service Attacks | |
JP2003309607A (en) | Anti-profiling apparatus and its program | |
JP4391455B2 (en) | Unauthorized access detection system and program for DDoS attack | |
US20240244079A1 (en) | Techniques for generating signatures characterizing advanced application layer flood attack tools | |
US20110314527A1 (en) | Internet protocol-based filtering device and method, and legitimate user identifying device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WALLMAN, BRUCE;REEL/FRAME:014365/0931 Effective date: 20030725 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |